G10L17/22

DEVICE INCLUDING SPEECH RECOGNITION FUNCTION AND METHOD OF RECOGNIZING SPEECH
20180005627 · 2018-01-04 ·

A device including a speech recognition function which recognizes speech from a user, includes: a loudspeaker which outputs speech to a space; a microphone which collects speech in the space; a first speech recognition unit which recognizes the speech collected by the microphone; a command control unit which issues a command for controlling the device, based on the speech recognized by the first speech recognition unit; and a control unit which prohibits the command issuance unit from issuing the command, based on the speech to be output from the loudspeaker.

DEVICE INCLUDING SPEECH RECOGNITION FUNCTION AND METHOD OF RECOGNIZING SPEECH
20180005627 · 2018-01-04 ·

A device including a speech recognition function which recognizes speech from a user, includes: a loudspeaker which outputs speech to a space; a microphone which collects speech in the space; a first speech recognition unit which recognizes the speech collected by the microphone; a command control unit which issues a command for controlling the device, based on the speech recognized by the first speech recognition unit; and a control unit which prohibits the command issuance unit from issuing the command, based on the speech to be output from the loudspeaker.

AUTHENTICATION METHOD
20180004925 · 2018-01-04 ·

An authentication method. The method comprises comparing user voice data received via an electronic device to a stored voice template to determine a voice authentication parameter. A voice authentication threshold is determined and the voice authentication parameter is compared to the voice authentication threshold to determine whether to authenticate the user. Determining the voice authentication threshold comprises determining a current value of an enrolment counter, then comparing the current value of the enrolment counter to an enrolment counter threshold and determining whether the stored voice template is fully enrolled according to the result. If the stored voice template is fully enrolled, the voice authentication threshold is set to a first voice authentication threshold. If the stored voice template is not fully enrolled then a device attribute received from the electronic device is compared to a stored device attribute. If the received device attribute matches the stored device attribute, the voice authentication threshold is set to a second voice authentication threshold determined by the current value of the enrolment counter. If the received device attribute does not match the stored device attribute, the voice authentication threshold is set to a third voice authentication threshold.

AUTHENTICATION METHOD
20180004925 · 2018-01-04 ·

An authentication method. The method comprises comparing user voice data received via an electronic device to a stored voice template to determine a voice authentication parameter. A voice authentication threshold is determined and the voice authentication parameter is compared to the voice authentication threshold to determine whether to authenticate the user. Determining the voice authentication threshold comprises determining a current value of an enrolment counter, then comparing the current value of the enrolment counter to an enrolment counter threshold and determining whether the stored voice template is fully enrolled according to the result. If the stored voice template is fully enrolled, the voice authentication threshold is set to a first voice authentication threshold. If the stored voice template is not fully enrolled then a device attribute received from the electronic device is compared to a stored device attribute. If the received device attribute matches the stored device attribute, the voice authentication threshold is set to a second voice authentication threshold determined by the current value of the enrolment counter. If the received device attribute does not match the stored device attribute, the voice authentication threshold is set to a third voice authentication threshold.

DISCOVERING CAPABILITIES OF THIRD-PARTY VOICE-ENABLED RESOURCES

Techniques are described for discovering capabilities of voice-enabled resources. A voice-controlled digital personal assistant can respond to user requests to list available voice-enabled resources that are capable of performing a specific task using voice input. The voice-controlled digital personal assistant can also respond to user requests to list the tasks that a particular voice-enabled resource can perform using voice input. The voice-controlled digital personal assistant can also support a practice mode in which users practice voice commands for performing tasks supported by voice-enabled resources.

DISCOVERING CAPABILITIES OF THIRD-PARTY VOICE-ENABLED RESOURCES

Techniques are described for discovering capabilities of voice-enabled resources. A voice-controlled digital personal assistant can respond to user requests to list available voice-enabled resources that are capable of performing a specific task using voice input. The voice-controlled digital personal assistant can also respond to user requests to list the tasks that a particular voice-enabled resource can perform using voice input. The voice-controlled digital personal assistant can also support a practice mode in which users practice voice commands for performing tasks supported by voice-enabled resources.

SPEAKER VERIFICATION USING CO-LOCATION INFORMATION
20180012604 · 2018-01-11 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying a user in a multi-user environment. One of the methods includes receiving, by a first user device, an audio signal encoding an utterance, obtaining, by the first user device, a first speaker model for a first user of the first user device, obtaining, by the first user device for a second user of a second user device that is co-located with the first user device, a second speaker model for the second user or a second score that indicates a respective likelihood that the utterance was spoken by the second user, and determining, by the first user device, that the utterance was spoken by the first user using (i) the first speaker model and the second speaker model or (ii) the first speaker model and the second score.

SPEAKER VERIFICATION USING CO-LOCATION INFORMATION
20180012604 · 2018-01-11 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying a user in a multi-user environment. One of the methods includes receiving, by a first user device, an audio signal encoding an utterance, obtaining, by the first user device, a first speaker model for a first user of the first user device, obtaining, by the first user device for a second user of a second user device that is co-located with the first user device, a second speaker model for the second user or a second score that indicates a respective likelihood that the utterance was spoken by the second user, and determining, by the first user device, that the utterance was spoken by the first user using (i) the first speaker model and the second speaker model or (ii) the first speaker model and the second score.

Autonomous material evaluation system and method
11710489 · 2023-07-25 ·

A system and method to determine a remaining useful life estimation of a material under evaluation. The equipment comprises at least one computer and a material features acquisition system operable to detect a plurality of material features. The features are then evaluated according to rules captured from of experts and inputted into the computer. The computer iterations are processed until an acceptable conclusion is made regarding the condition of the material under evaluation. The remaining useful life estimation capability may also be retrofitted into conventional inspection systems by extracting pertinent features through spectral frequency analysis and sensor normalization and utilizing those features in the autonomous remaining useful life estimation system.

Method and System for Facilitating the Detection of Time Series Patterns
20180012120 · 2018-01-11 ·

According to a first aspect of the present disclosure, a method for facilitating the detection of one or more time series patterns is conceived, comprising building one or more artificial neural networks, wherein, for at least one time series pattern to be detected, a specific one of said artificial neural networks is built. According to a second aspect of the present disclosure, a corresponding computer program is provided. According to a third aspect of the present disclosure, a non-transitory computer-readable medium is provided that comprises a computer program of the kind set forth. According to a fourth aspect of the present disclosure, a corresponding system for facilitating the detection of one or more time series patterns is provided.